Cisco Certified Support Technician (CCST) Cybersecurity 100-160

(100-160.AB1)/ISBN:978-1-64459-561-9

This course includes
Lessons
TestPrep
Hands-On Labs

Lessons

21+ Lessons | 208+ Exercises | 166+ Quizzes | 319+ Flashcards | 319+ Glossary of terms

TestPrep

45+ Pre Assessment Questions | 2+ Full Length Tests | 50+ Post Assessment Questions | 51+ Practice Test Questions

Hands-On Labs

41+ LiveLab | 00+ Minutes

Here's what you will learn

Download Course Outline

Lessons 1: Introduction

  • Goals and Methods
  • Who Should Read This Course?
  • Strategies for Exam Preparation
  • How This Course Is Organized
  • Certification Exam Topics and This Course
  • Taking the CCST Cybersecurity Certification Exam
  • Tracking Your Status
  • How to Prepare for an Exam
  • Assessing Exam Readiness
  • Cisco Cybersecurity Certifications in the Real World
  • Exam Registration
  • Course Content Updates

Lessons 2: Security Principles

  • The CIA Triad
  • Common Security Terms
  • Types of Attackers and Their Reasons for Attacks
  • Code of Ethics
  • Summary
  • Review All Key Topics

Lessons 3: Common Threats, Attacks, and Vulnerabilities

  • Malware Variants
  • IoT Vulnerabilities
  • Distributed Denial of Service
  • On-Path Attacks
  • Insider Threats
  • Social Engineering Tactics
  • Physical Attacks
  • Advanced Persistent Threats (APTs)
  • Summary
  • Review All Key Topics

Lessons 4: Access Management

  • Introduction to AAA
  • Authentication
  • Authorization
  • Accounting
  • RADIUS
  • Summary
  • Review All Key Topics

Lessons 5: Cryptography

  • Cryptography Overview
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Using Symmetric and Asymmetric Cryptography
  • Types of Ciphers
  • Certificates and PKI
  • Hashing
  • Cryptography in the Real World
  • Cisco Next-Generation Cryptography
  • Summary
  • Review All Key Topics

Lessons 6: Introduction to Networking, Addressing, and TCP/IP Protocols

  • The TCP/IP Stack
  • Common TCP/IP Protocols and Their Vulnerabilities
  • Network Addressing and Its Impact on Security
  • Summary
  • Review All Key Topics

Lessons 7: Network Infrastructure

  • The Network Security Architecture
  • Screened Subnets, Virtualization, and the Cloud
  • Proxy Servers
  • Honeypots
  • Intrusion Detection/Prevention Systems
  • Summary
  • Review All Key Topics

Lessons 8: Controlling Network Access

  • Virtual Private Networks
  • Firewalls
  • Access Control Lists
  • Network Access Control
  • Summary
  • Review All Key Topics

Lessons 9: Wireless SOHO Security

  • Hardening Wireless Routers and Access Points
  • Wireless Encryption Standards
  • Wireless Authentication
  • Wi-Fi Protected Setup, SSIDs, and MAC Address Filtering
  • Common Wireless Network Threats and Attacks
  • Summary
  • Review All Key Topics

Lessons 10: Operating Systems and Tools

  • Host Security Features
  • Windows
  • Linux
  • macOS
  • Tools
  • Summary
  • Review All Key Topics

Lessons 11: Endpoint Policies and Standards

  • Asset Management
  • Program Deployment
  • Backups
  • Bring Your Own Device (BYOD)
  • Regulatory Compliance
  • Summary
  • Review All Key Topics

Lessons 12: Network and Endpoint Malware Detection and Remediation

  • Monitoring and Detection
  • Malware Remediation Best Practices
  • Summary
  • Review All Key Topics

Lessons 13: Risk and Vulnerability Management

  • The Vocabulary of Risk
  • Vulnerabilities
  • Risk
  • Summary
  • Review All Key Topics

Lessons 14: Threat Intelligence

  • Threat Intelligence
  • Vulnerabilities Databases and Feeds
  • Additional Sources of Threat Intelligence
  • How and Why to Proactively Share Threat Intelligence
  • Summary
  • Review All Key Topics

Lessons 15: Disaster Recovery and Business Continuity

  • Disaster Recovery Plans
  • Business Impact Analyses (BIAs)
  • Business Continuity Plans
  • Disaster Recovery Versus Business Continuity
  • Summary
  • Review All Key Topics

Lessons 16: Incident Handling

  • Events and Incidents
  • Incident Response
  • Attack Frameworks and Concepts
  • Evidence and Artifacts
  • Compliance Frameworks
  • Summary
  • Review All Key Topics

Lessons 17: Final Preparation

  • Tools and Resources
  • Study Tips
  • Summary

Lessons 18: Practice Set A

  • question

Lessons 19: Practice Set B

  • question

Lessons 20: Practice Set C

  • questions

Lessons 21: Practice Set D

  • questions

Hands-on LAB Activities

Security Principles

  • Using the Ansible Tool

Common Threats, Attacks, and Vulnerabilities

  • Analyzing Malware
  • Performing DoS Attacks with a SYN Flood
  • Performing a Phishing Attack

Cryptography

  • Performing Symmetric Information
  • Examining Asymmetric Encryption
  • Examining PKI Certificates
  • Observing an SHA256-Generated Hash Value
  • Observing an MD5-Generated Hash Value

Introduction to Networking, Addressing, and TCP/IP Protocols

  • Using TCP/IP Protocols in Linux
  • Configuring an FTP Server
  • Configuring NAT on the ISA Gateway (Windows Server)
  • Viewing the MAC Address on Different Interfaces
  • Configuring a Class A IP Address

Network Infrastructure

  • Setting up a Demilitarized Zone
  • Installing the Proxy Server Feature
  • Setting Up a Honeypot
  • Enabling Intrusion Detection and Prevention

Controlling Network Access

  • Configuring a VPN
  • Using Windows Firewall
  • Configuring a Standard ACL
  • Enabling an Access Control List

Wireless SOHO Security

  • Configuring SOHO-Grade Access Points
  • Configuring a Wireless AP
  • Configuring WPA2 Enterprise Security
  • Using a Wireless AP for MAC Address Filtering
  • Detecting a Brute Force Attack

Operating Systems and Tools

  • Configuring the Windows Defender Settings
  • Using Windows Event Viewer
  • Managing NTFS Permissions
  • Using the dig Command on Linux
  • Using the nslookup Command
  • Using the netstat Command on Linux
  • Capturing a Packet Using Wireshark
  • Using the netstat Command

Endpoint Policies and Standards

  • Creating a Backup

Network and Endpoint Malware Detection and Remediation

  • Creating YARA Rules

Risk and Vulnerability Management

  • Performing Nmap SYN Scan
  • Conducting Vulnerability Scanning Using Nessus

Threat Intelligence

  • Studying CVSS Exercises with the CVSS Calculator
  • Consulting a Vulnerability Database